Get Demo
An attacker can upload an arbitrary file instead of a plant image.
The product does not properly distinguish between different types of elements in a way that leads to insecure behavior.